What are the three main concepts for the security of information assets?

A. Confidentiality, integrity, and availability
B. Confidentiality, integrity, and authentication
C. Confidentiality, integrity, and accountability
D. Risks, threats, and vulnerabilities


A

Explanation: The three main concepts for the security of information assets are confidentiality, integrity, and availability (CIA).

Computer Science & Information Technology

You might also like to view...

Parallel executing procedures share a common stack area using a structure called a ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Write a program that creates Pet objects from data read from the keyboard. Store these objects into an instance of ArrayList. Then sort the Pet objects into alphabetic order by pet name, and finally display the data in the sorted Pet objects on the screen. The class Pet is given in Chapter 6, Listing 6.1.

This Project has the potential for being more difficult than the Practice Programs since it uses a list of elements other than Strings, which the author states can lead to subtle problems. The PetRecord variable nextPet must be declared inside the while-loop so it is created fresh each iteration. It must be redeclared each time to ensure that PetRecords previously added to the list are not overwritten with data entered on the next iteration. If nextPet is created only once, outside the while-loop (before entering it), the new values entered are written to same address each time and all the PetRecords in the list will end up with identical data, the values entered in the last iteration.

Computer Science & Information Technology

Offshoring is when companies hire workers from foreign countries.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

__________ is an encryption method designed for signing and encrypting email, which uses both symmetric and asymmetric encryption

a. Data encryption standard b. Triple data encryption standard c. Pretty good privacy d. None of the above

Computer Science & Information Technology